|
Search the dblp DataBase
Federica Paci:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Elisa Bertino, Jason Crampton, Federica Paci
Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP] ICWS, 2006, pp:275-284 [Conf]
- Massimo Mecella, Mourad Ouzzani, Federica Paci, Elisa Bertino
Access control enforcement for conversation-based web services. [Citation Graph (0, 0)][DBLP] WWW, 2006, pp:257-266 [Conf]
- Jacques Thomas, Federica Paci, Elisa Bertino, Patrick Eugster
User Tasks and Access Control overWeb Services. [Citation Graph (0, 0)][DBLP] ICWS, 2007, pp:60-69 [Conf]
- Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza
A system for securing push-based distribution of XML documents. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2007, v:6, n:4, pp:255-284 [Journal]
- Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham
PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]
Verification of Access Control Requirements in Web Services Choreography. [Citation Graph (, )][DBLP]
PriMa: an effective privacy protection mechanism for social networks. [Citation Graph (, )][DBLP]
Minimal credential disclosure in trust negotiations. [Citation Graph (, )][DBLP]
Trust establishment in the formation of Virtual Organizations. [Citation Graph (, )][DBLP]
A privacy-preserving approach to policy-based content dissemination. [Citation Graph (, )][DBLP]
Authorization and User Failure Resiliency for WS-BPEL Business Processes. [Citation Graph (, )][DBLP]
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. [Citation Graph (, )][DBLP]
VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. [Citation Graph (, )][DBLP]
VeryIDX - A Digital Identity Management System for Pervasive Computing Environments. [Citation Graph (, )][DBLP]
Collective privacy management in social networks. [Citation Graph (, )][DBLP]
Monitoring Contract Enforcement within Virtual Organizations. [Citation Graph (, )][DBLP]
A Federated Digital Identity Management Approach for Business Processes. [Citation Graph (, )][DBLP]
Privacy-preserving management of transactions' receipts for mobile environments. [Citation Graph (, )][DBLP]
Efficient and privacy-preserving enforcement of attribute-based access control. [Citation Graph (, )][DBLP]
An Interoperable Approach to Multifactor Identity Verification. [Citation Graph (, )][DBLP]
Privacy-preserving Digital Identity Management for Cloud Computing. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|